HIPAA Security. ible. isions. Requirements, and their implementation. reader has

Size: px
Start display at page:

Download "HIPAA Security. ible. isions. Requirements, and their implementation. reader has"

Transcription

1 HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical Safeguards 5. Security Standards - Organizational, Policies and Procedures and Documentation Requirements 6. Basics of Risk Analysis and Risk Management 7. Implementation for the Small Provider 5 Security Standards: Organizational, Policies and What is the Security Series? The security series of papers provides guidance from the Centers for Medicare & Medicaid Services (CMS) on the rule titled Security Standar ds for the Protection of Electronic Protected Health Information, found at 45 CFR Part 160 and Part 164, Subparts A and C. This rule, commonly kno wn as the Security Rule, was adopted to implement provisions of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The series will contain seven papers, each focused on a specific topic related to the Security Rule. The papers, which cover the topics listed to the left, are designed to give HIPAA covered entities insight into the Security Rule and Compliance Deadlines assistance with implementation of the No later than April 20, 2005 for security standards. This series explains all covered entities except small specific requirements, the though t process health plans, which have until behind those requirements, and poss ible no later than April 20, ways to address the prov isions. CMS recommends that covered entities read the first paper in this series, Security 101 for Covered Entities before reading the other papers. The first paper clarifies important Security Rule concepts that will help covered entities as they plan for implementation. This fifth paper in the series is devoted to the standards for Organizational Requirements and Policies NOTE: To download the first and Procedures and Documentation paper in this series, Security 101 for Covered Entities, visit Requirements, and their implementation the CMS website at: specifications, and assumes the reader has a basic understanding of the Security Rule. Background Three earlier papers in this series discuss the Administrative, Phys ical, and Technical Safeguards standards in the Security Rule. While these Volume 2 / Paper 5 1 May 2005

2 HIPAA SECURITY STANDARDS Security Standards: General Rules ADMINISTRATIVE SAFEGUARDS - Security Management Process - Assigned Security Responsibility - Workforce Security - Information Access Management - Security Awareness and Training - Security Incident Procedures - Contingency Plan - Evaluation - Business Associate Contracts and Other Arrangements STANDARD PHYSICAL SAFEGUARDS (a)(1) - Facility Access Controls - Workstation Use - Workstation Security - Device and Media Controls TECHNICAL SAFEGUARDS - Access Control - Audit Controls - Integrity - Person or Entity Authentication - Transmission Security ORGANIZATIONAL REQUIREMENTS - Business Associate Contracts or Other Arrangements - Requirements for Group Health Plans POLICIES and PROCEDURES and DOCUMENTATION REQUIREMENTS safeguards comprise the vast majority of standards and implementation specifications, there are four other standards that must be implemented; the other four standards are addressed in this paper and in 45 CFR and The standards at 45 CFR , Organizational Requirements, and , Policies and, immediately follow the Technical Safeguards standards. They are not included in Appendix A the Security Standards: Matrix that is found at the end of the Security Rule, but must not be overlooked by covered entities. These requirements must be implemented to achieve compliance. The objectives of this paper are to: Review each Organizational Requirements and Policies and standard and implementation specification listed in the Security Rule. Discuss the purpose for each standard Organizational Requirements STANDARD (a)(1) o Business Associate Contracts r Other Arrangements The Business Associate Contracts and Other Arrangements standard found at (b)(1) requires a covered entity to have contracts or other arrangements with business associates that will have access to the covered entity s electronic protected health information (EPHI). The standard, at (a)(1), provides the specific criteria required for written contracts or other arrangements between a covered entity and its business associates. The actual language used to address the requirements can be tailored to the needs of each organization, as long as the requirements are addressed. In general, a business associate is a person or entity other than a member of the covered entity s workforce that performs functions or activities on the covered entity s behalf, or provides specified services to the covered entity, that involve the use or disclosure of protected health information. A business associate may also be a covered entity. Volume 2 / Paper 5 2 May 2005

3 For example, a health care clearinghouse may be a business associate and is also a covered entity under HIPAA. A software vendor may be a business associate as well; however, it is not, in that capacity, a covered entity. In both cases, the organizations could perform certain functions, activities or services on behalf of the covered entity and would therefore be business associates. (See 45 CFR , for the definition of business associate. ) Section (a)(1)(ii) also identifies certain situations when a covered entity would not be in compliance with this standard despite the existence of a business associate contract. (ii) A covered entity is not in compliance with the standards in (e) [the HIPAA Privacy Rule - Disclosures to Business Associates standard] and paragraph (a) of this section [the Business Associate Contracts or Other Arrangements standard] if the covered entity knew of a pattern of an activity or practice of the business associate that constituted a material breach or violation of the business associate s obligation under the contract or other arrangement, unless the covered entity took reasonable steps to cure the breach or end the violation, as applicable, and, if such steps were unsuccessful Terminated the contract or arrangement, if feasible; or (B) If termination is not feasible, reported the problem to the Secretary. The two implementation specifications of this standard are: 1. Business associate contracts (Required) 2. Other arrangements (Required) 1. BUSINESS ASSOCIATE CONTRACTS (a)(2)(i) The Business Associate Contracts implementation specifications state that a business associate contract must provide that the business associate will: Implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the electronic protected health information that it creates, receives, maintains, or transmits on behalf of the covered entity ; (B) Ensure that any agent, including a subcontractor, to whom it provides such information agrees to implement reasonable and appropriate safeguards to protect it; Volume 2 / Paper 5 3 May 2005

4 (C) Report to the covered entity any security incident of which it becomes aware; (D) Authorize termination of the contract by the covered entity, if the covered entity determines that the business associate has violated a material term of the contract. Covered entities may already have business associate contracts in place in order to comply with the Privacy Rule. If the business associate creates, receives, maintains, or transmits EPHI, these existing contracts should be reviewed and modified in order to meet the Security Rule Business Associate Contracts requirements. Alternatively, covered entities could have two separate contracts to address the requirements of the Privacy and Security Rules respectively. 2. OTHER ARRANGEMENTS (a)(2)(ii) The Other Arrangements implementation specifications provide that when a covered entity and its business associate are both government entities, the covered entity may comply with the standard in either of two alternative ways: (1) if it enters into a memorandum of understanding (MOU) with the business associate and the MOU contains terms which accomplish the objectives of the Business Associate Contracts section of the Security Rule; or (2) if other law (including regulations adopted by the covered entity or its business associate) contain requirements applicable to the business associate that accomplish the objectives of the business associate contract. If statutory obligations of the covered entity or its business associate do not permit the covered entity to include in its other arrangements authorization of the termination of the contract by the covered entity, the termination authorization may be omitted. (See (a)(2)(ii)(C).) This implementation specification also applies to certain situations in which other laws require a business associate to perform certain functions or activities on behalf of the covered entity or provide certain services to the covered entity. These situations will not be discussed in detail within this paper. (See (a)(2)(ii)(B).) Volume 2 / Paper 5 4 May 2005

5 STANDARD (b)(1) Requirements for Group Health Plans The second standard in is the Requirements for Group Health Plans. The standard requires a group health plan to ensure that its plan documents require the plan sponsor to reasonably and appropriately safeguard EPHI that it creates, receives, maintains or transmits on behalf of the group health NOTE: The definition of a Group Health Plan can be found in 45 CFR plan. (See 45 CFR (b)(1).) Specific exceptions to this requirement are provided when the only EPHI disclosed to a plan sponsor is disclosed pursuant to permitted disclosures under the HIPAA Privacy Rule, specifically (f)(1)(ii) or (iii), or as authorized under The standard includes the following required implementation specifications: IMPLEMENTATION SPECIFICATIONS (b)(2) The plan documents of the group health plan must incorporate provisions to require the plan sponsor to: (i) Implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the electronic protected health information that it creates, receives, maintains, or transmits on behalf of the group health plan; (ii) Ensure that the adequate separation required by (f)(2)(iii) [of the Privacy Rule] is supported by reasonable and appropriate security measures; (iii) Ensure that any agent, including a subcontractor, to whom it provides this information agrees to implement reasonable and appropriate security measures to protect the information; and (iv) Report to the group health plan any security incident of which it becomes aware. In other words, the Security Rule generally requires that if the plan sponsor of a group health plan has access to EPHI beyond summary information and enrollment information or to EPHI other than that which has been authorized under , the plan documents must contain language similar to that already required by the Privacy Rule. Volume 2 / Paper 5 5 May 2005

6 Policies and procedures and documentation requirements In addition to the policies, procedures and documentation contained throughout the Security Rule, sets forth specific requirements for all policies, procedures and documentation required by the Rule. STANDARD (a) Policies and Procedures The first standard, Policies and Procedures, contains several important concepts. Specifically, it requires that covered entities: Implement reasonable and appropriate policies and procedures to comply with the standards, implementation specifications, or other requirements of this subpart, taking into account those factors specified in (b)(2)(i), (ii), (iii), and (iv) [the Security Standards: General Rules, Flexibility of Approach]. This standard is not to be construed to permit or excuse an action that violates any other standard, implementation specification, or other requirements of this subpart. A covered entity may change its policies and procedures at any time, provided that the changes are documented and are implemented in accordance with this subpart. The reference to (b)(2), the Security Standards: General Rules, is specifically to the Flexibility of Approach provisions that outline the types of factors covered entities must consider when implementing the Security Rule. NOTE: For more information about the concepts behind the General Standards, see the first paper in this series, Security 101 for Covered Entities. While this standard requires covered entities to implement policies and procedures, the Security Rule does not define either policy or procedure. Generally, policies define an organization s approach. For example, most business policies establish measurable objectives and expectations for the workforce, assign responsibility for decision-making, and define enforcement and consequences for violations. Procedures describe how the organization carries out that approach, setting forth explicit, step-by-step instructions that implement the organization s policies. Policies and procedures should reflect the mission and culture of the organization; thus, the Security Rule enables each covered entity to use current standard business practices for policy development and implementation. Polices and procedures required by the Security Rule may be Volume 2 / Paper 5 6 May 2005

7 modified as necessary to meet the changing needs of the organization, as long as the changes are documented and implemented in accordance with the Security Rule. The Policies and Procedures standard is further explained and supported by the Documentation standard. STANDARD (b)(1) Documentation The Documentation standard requires covered entities to: (i) Maintain the policies and procedures implemented to comply with this subpart in written (which may be electronic) form; and (ii) if an action, activity or assessment is required by this subpart to be documented, maintain a written (which may be electronic) record of the action, activity, or assessment. The Documentation standard has three implementation specifications. 1. Time Limit (Required) 2. Availability (Required) 3. Updates (Required) 1. TIME LIMIT (b)(2)(i) The Time Limit implementation specification requires covered entities to: Retain the documentation required by paragraph (b)(1) of this section for 6 years from the date of its creation or the date when it last was in effect, whichever is later. This six-year period must be considered the minimum retention period for required documentation under the Security Rule. Some organizations may choose to keep their documentation longer based on state law, requirements of accreditation organizations, or other business reasons. Volume 2 / Paper 5 7 May 2005

8 2. AVAILABILITY (b)(2)(ii) The Availability implementation specification requires covered entities to: Make documentation available to those persons responsible for implementing the procedures to which the documentation pertains. Organizations often make documentation available in printed manuals and/or on Intranet websites. 3. UPDATES (b)(2)(iii) The Updates implementation specification requires covered entities to: Review documentation periodically, and update as needed, in response to environmental or operational changes affecting the security of the electronic protected health information. The need for review and update will vary based on a covered entity s documentation review frequency and/or the volume of environmental or operational changes that affect the security of EPHI. This implementation specification requires covered entities to manage their documentation so that it reflects the current status of their security plans and procedures implemented to comply with the Security Rule. In Summary The Organizational Requirements section of the Security Rule, among other things, provides requirements for the content of business associate contracts or other arrangements and the plan documents of group health plans. The Policies and section, among other things, requires covered entities to implement and maintain written policies, procedures and documentation required to comply with the Security Rule. Volume 2 / Paper 5 8 May 2005

9 Resources The next paper in this series, paper #6 Basics of Risk Analysis and Risk Management outlines some of the general techniques used in risk analysis and risk management. Not all of the material discussed in the Basics of Risk Analysis and Risk Management paper will apply to all covered entities. The basic concepts and techniques discussed in this paper will be useful for most covered entities. Covered entities should periodically check the CMS website at for additional information and resources as they work through the security implementation process. There are many other sources of information available on the Internet. While CMS does not endorse guidance provided by other organizations, covered entities may also want to check with other local and national professional health care organizations, such as national provider and health plan associations for additional information. Need more information? Visit the CMS website often at for the latest security papers, checklists, webcasts, and announcements of upcoming events. Call the CMS HIPAA Hotline at , use the HIPAA TTY , or CMS at Visit the Office for Civil Rights website, for the latest guidance, FAQs and other information on the Privacy Rule. Volume 2 / Paper 5 9 May 2005

10 Security Standards Matrix (Appendix A of the Security Rule) ADMINISTRATIVE SAFEGUARDS Standards Security Management Process Assigned Security Responsibility Workforce Security Information Access Management Security Awareness and Training Security Incident Procedures Contingency Plan Evaluation Sections (a)(1) (a)(2) Implementation Specifications = Required, =Addressable Risk Analysis Risk Management Sanction Policy Information System Activity Review (a)(3) Authorization and/or Supervision Workforce Clearance Procedure Termination Procedures (a)(4) Isolating Health Care Clearinghouse Functions Access Authorization Access Establishment and Modification (a)(5) Security Reminders Protection from Malicious Software Log-in Monitoring Password Management (a)(6) Response and Reporting (a)(7) (a)(8) Data Backup Plan Disaster Recovery Plan Emergency Mode Operation Plan Testing and Revision Procedures Applications and Data Criticality Analysis Business Associate Contracts and Other Arrangements (b)(1) Written Contract or Other Arrangement Volume 2 / Paper 5 10 May 2005

11 PHYSICAL SAFEGUARDS Standards Facility Access Controls Workstation Use Sections (a)(1) (b) Implementation Specifications = Required, =Addressable Contingency Operations Facility Security Plan Access Control and Validation Procedures Maintenance Records Workstation Security (c) Device and Media Controls TECHNICAL SAFEGUARDS Standards Access Control Audit Controls (d)(1) Sections (a)(1) (b) Disposal Media Re-use Accountability Data Backup and Storage Implementation Specifications = Required, =Addressable Unique User Identification Emergency Access Procedure Automatic Logoff Encryption and Decryption Integrity (c)(1) Mechanism to Authenticate Electronic Protected Health Information Person or Entity (d) Authentication Transmission (e)(1) Integrity Controls Security Encryption ORGANIZATIONAL REQUIREMENTS Standards Sections Implementation Specifications = Required, =Addressable Business associate (a)(1) Business Associate contracts or other arrangements Contracts Other Arrangements Requirements for Group Health Plans (b)(1) Implementation Specifications Volume 2 / Paper 5 11 May 2005

12 POLICIES AND PROCEDURES AND DOCUMENTATION REQUIREMENTS Standards Sections Implementation Specifications = Required, =Addressable Policies and (a) Procedures Documentation (b)(1) Time Limit Availability Updates Volume 2 / Paper 5 12 May 2005

1 Security 101 for Covered Entities

1 Security 101 for Covered Entities HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

HIPAA Compliance Guide

HIPAA Compliance Guide This document provides an overview of the Health Insurance Portability and Accountability Act (HIPAA) compliance requirements. It covers the relevant legislation, required procedures, and ways that your

More information

Managing Information Privacy & Security in Healthcare. The HIPAA Security Rule in Plain English 1. By Kristen Sostrom and Jeff Collmann Ph.

Managing Information Privacy & Security in Healthcare. The HIPAA Security Rule in Plain English 1. By Kristen Sostrom and Jeff Collmann Ph. Managing Information Privacy & Security in Healthcare The HIPAA Security Rule in Plain English 1 By Kristen Sostrom and Jeff Collmann Ph.D This document includes a Plain English explanation for the general

More information

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) Delhaize America, LLC Pharmacies and Welfare Benefit Plan 2013 Health Information Security and Procedures (As

More information

Meaningful Use Requirement for HIPAA Security Risk Assessment

Meaningful Use Requirement for HIPAA Security Risk Assessment Meaningful Use Requirement for HIPAA Security Risk Assessment The MU attestation requirement does not state that any gaps must be resolved prior to meaningful use attestation. Mary Sirois, MBA, PT, CPHIMSS

More information

HIPAA Privacy and Security for Employers in the Age of Common Data Breaches. April 30, 2015

HIPAA Privacy and Security for Employers in the Age of Common Data Breaches. April 30, 2015 HIPAA Privacy and Security for Employers in the Age of Common Data Breaches April 30, 2015 HIPAA Privacy and Security for Employers in the Age of Common Data Breaches Welcome! We will begin at 3 p.m. Eastern

More information

HTKT.book Page 1 Monday, July 13, :59 PM HIPAA Tool Kit 2017

HTKT.book Page 1 Monday, July 13, :59 PM HIPAA Tool Kit 2017 HIPAA Tool Kit 2017 Contents Introduction...1 About This Manual... 1 A Word About Covered Entities... 1 A Brief Refresher Course on HIPAA... 2 A Brief Update on HIPAA... 2 Progress Report... 4 Ongoing

More information

1.) The Privacy Rule (Part 164, Subpart E)

1.) The Privacy Rule (Part 164, Subpart E) 1.) The Privacy Rule (Part 164, Subpart E) 164.500 Applicability 164.501 Definitions (health care operations, marketing, underwriting purposes, payment) 164.502 Uses and disclosures of protected health

More information

HIPAA Service Description

HIPAA Service Description PO Box 8021 Rancho Santa Fe California 92067 858.259.6204 tel 858.259.0309 fax www.practicalsecurity.com HIPAA Service Description February 2003 1 2 3 PSI HIPAA Services Offering The Department of Health

More information

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014.

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014. HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule Association of Corporate Counsel Houston Chapter October 14, 2014 Jeffery P. Drummond Jackson Walker L.L.P. 901 Main Street, Suite 6000 Dallas,

More information

ARE YOU HIP WITH HIPAA?

ARE YOU HIP WITH HIPAA? ARE YOU HIP WITH HIPAA? Scott C. Thompson 214.651.5075 scott.thompson@haynesboone.com February 11, 2016 HIPAA SECURITY WHY SHOULD I CARE? Health plan fined $1.2 million for HIPAA breach. Health plan fined

More information

SDM Health Insurance Portability and Accountability Act (HIPAA) Terms and Conditions For Business Associates

SDM Health Insurance Portability and Accountability Act (HIPAA) Terms and Conditions For Business Associates Policy and Procedure: SDM HIPAA Terms and Conditions for (Adapted from UPMC s HIPAA Terms and Conditions for at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/terms.pdf) Effective: 03/30/2012

More information

Privacy Regulations HIPAA-Administrative Simplification Internal Assessment

Privacy Regulations HIPAA-Administrative Simplification Internal Assessment Privacy Regulations HIPAA-Administrative Simplification Internal Regulation/Standard Use and Disclosure 164.502 Uses and disclosures of protected health information: general rules. (a) Standard. A covered

More information

PLAN SPONSOR CERTIFICATION TO THE GROUP HEALTH PLAN

PLAN SPONSOR CERTIFICATION TO THE GROUP HEALTH PLAN PLAN SPONSOR CERTIFICATION TO THE GROUP HEALTH PLAN The self-funded group health plan (the Plan ) that you, as an employer, sponsor is a Covered Entity as defined by the Health Insurance Portability and

More information

HIPAA COMPLIANCE. for Small & Mid-Size Practices

HIPAA COMPLIANCE. for Small & Mid-Size Practices HIPAA COMPLIANCE for Small & Mid-Size Practices Golden State Web Solutions 619.825.GSWS (4797) INTRODUCTION Most individuals reading this are interested in HIPAA, GSWS, or some combination of the two;

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement THIS BUSINESS ASSOCIATE AGREEMENT (this Agreement ) is effective by and between CRESTPOINT HEALTH INSURANCE COMPANY, on behalf of itself and its affiliates (collectively, Covered

More information

Eastern Iowa Mental Health and Disability Services. HIPAA Policies and Procedures Manual

Eastern Iowa Mental Health and Disability Services. HIPAA Policies and Procedures Manual Eastern Iowa Mental Health and Disability Services HIPAA Policies and Procedures Manual This HIPAA Master Manual has been reviewed, accepted and approved by: Eastern Iowa MH/DS Region Governing Board of

More information

HIPAA Background and History

HIPAA Background and History Agenda Jeffery P. Drummond Lawyers as HIPAA Business Associates: Ethical Obligations and Practical Tips for Compliance Dallas Bar Association January 17, 2018 Jamie Sorley An Overview of HIPAA The Privacy

More information

Conduct of covered entity or business associate. Did not know and, by exercising reasonable diligence, would not have known of the violation

Conduct of covered entity or business associate. Did not know and, by exercising reasonable diligence, would not have known of the violation HIPAA UPDATE: WHY AND HOW YOU MUST COMPLY 1 In January 2013, the Department of Health and Human Services ( HHS ) issued its long-awaited Omnibus Rule 2 implementing regulations required by the HITECH Act

More information

GUIDANCE ON HIPAA & CLOUD COMPUTING

GUIDANCE ON HIPAA & CLOUD COMPUTING GUIDANCE ON HIPAA & CLOUD COMPUTING http://www.hhs.gov/hipaa/for-professionals/special-topics/cloudcomputing/index.html January 26, 2017 Health Care Cloud Coalition Deven McGraw, Deputy Director, Health

More information

BUSINESS ASSOCIATE AGREEMENT Between THE NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS and

BUSINESS ASSOCIATE AGREEMENT Between THE NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS and BUSINESS ASSOCIATE AGREEMENT Between THE NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS and WHEREAS, Dallas County, Tarrant County, Denton County, Parker County, the North Texas Tollway Authority have created

More information

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate?

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate? HIPAA Information Who does HIPAA apply to? HIPAA applies to all Covered Entities (entities that collect, access, use and/or disclose Protected Health Data (PHI) and are subject to HIPAA regulations). What

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

Health Insurance Portability and Accountability Act (HIPAA) Terms and Conditions For Business Associates

Health Insurance Portability and Accountability Act (HIPAA) Terms and Conditions For Business Associates Health Insurance Portability and Accountability Act (HIPAA) Terms and Conditions For Business Associates I. OVERVIEW/DEFINITIONS The Health Insurance Portability and Accountability Act (HIPAA) is a federal

More information

Business Associate Agreement For Protected Healthcare Information

Business Associate Agreement For Protected Healthcare Information Business Associate Agreement For Protected Healthcare Information This Business Associate Agreement ( Agreement ) is entered into this 24th day of February 2017, between PRACTICE-WEB, Inc., a California

More information

HIPAA Privacy & Security. Transportation Providers 2017

HIPAA Privacy & Security. Transportation Providers 2017 HIPAA Privacy & Security Transportation Providers 2017 HIPAA Privacy & Security As a non emergency medical transportation provider, you deal directly with Medicare and Medicaid Members healthcare information

More information

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners

2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners 2013 HIPAA Omnibus Regulations: New Rules for Healthcare Providers and Collections Partners Providers, and Partners 2 Editor s Foreword What follows are excerpts from the U.S. Department of Health and

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) by and between (hereinafter known as Covered Entity ) and Office Ally, Inc., a clearinghouse Covered Entity under HIPAA, providing

More information

COUNTY SOCIAL SERVICES POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA

COUNTY SOCIAL SERVICES POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA COUNTY SOCIAL SERVICES POLICIES AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 HIPAA 1 Recommended by ISP Committee of CSS on October 22 nd, 2014 Amended

More information

Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees

Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees Auditing for HIPAA Compliance: Evaluating security and privacy compliance in an organization that provides health insurance benefits to employees San Antonio IIA: I HEART AUDIT CONFERENCE February 24,

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement This Business Associate Agreement (this Agreement ) is entered into on the Effective Date of the Azalea Health Software as a Service Agreement and/or Billing Service Provider

More information

HIPAA Privacy Compliance Checklist

HIPAA Privacy Compliance Checklist HIPAA Privacy Compliance Checklist Task Obtain Education on HIPAA Privacy Requirements 1. HIPAA EDI requirements. 2. HIPAA privacy requirements. Organize the HIPAA Privacy Team and Create a Game Plan 1.

More information

HIPAA: Impact on Corporate Compliance

HIPAA: Impact on Corporate Compliance HIPAA: Impact on Corporate Compliance AAPC HEALTHCON April 2014 Stacy Harper, JD, MHSA, CPC Disclaimer The information provided is for educational purposes only and is not intended to be considered legal

More information

Business Associate Agreement Health Insurance Portability and Accountability Act (HIPAA)

Business Associate Agreement Health Insurance Portability and Accountability Act (HIPAA) Business Associate Agreement Health Insurance Portability and Accountability Act (HIPAA) This Business Associate Agreement (the Agreement ) is made and entered into by and between Washington Dental Service

More information

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know 1801 California Street Suite 4900 Denver, CO 80202 303-830-1776 Facsimile 303-894-9239 MEMORANDUM To: Adam Finkel, Assistant Director, Government Relations, NCRA From: Mel Gates Date: December 23, 2013

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( Agreement ) is entered into this 22 nd day of September, 2014 ( Effective Date ), by and between Customer_Name with a place of business

More information

March 1. HIPAA Privacy Policy

March 1. HIPAA Privacy Policy March 1 HIPAA Privacy Policy 2016 1 PRIVACY POLICY STATEMENT Purpose: The following privacy policy is adopted by the Florida College System Risk Management Consortium (FCSRMC) Health Program and its member

More information

BUSINESS ASSOCIATE AGREEMENT W I T N E S S E T H:

BUSINESS ASSOCIATE AGREEMENT W I T N E S S E T H: BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( this Agreement ) is made and entered into as of this day of 2015, by and between TIDEWELL HOSPICE, INC., a Florida not-for-profit corporation,

More information

TEXAS SOUTHERN UNIVERSITY HIPAA BUSINESS ASSOCIATE AGREEMENT

TEXAS SOUTHERN UNIVERSITY HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement (this BA Agreement ) is made and entered into by ( Provider ), a, located at, and Texas Southern University, an agency and institution of higher education established

More information

IHDE BUSINESS ASSOCIATE AGREEMENT (BAA)

IHDE BUSINESS ASSOCIATE AGREEMENT (BAA) IHDE BUSINESS ASSOCIATE AGREEMENT (BAA) This Business Associate Agreement (BAA) is entered into by and between the Covered Entity aka. Data Provider/User, (please enter name of organization) and the Business

More information

HIPAA PRIVACY RULE POLICIES AND PROCEDURES

HIPAA PRIVACY RULE POLICIES AND PROCEDURES HIPAA PRIVACY RULE POLICIES AND PROCEDURES Purpose: The purpose of this document is to educate, and identify the need to formally create and implement policies and procedures for Hudson Community School

More information

Preparing for the HIPAA Security Rules

Preparing for the HIPAA Security Rules ACS Sponsored Practice Management Teleconference Series March 24th & 27th, 2004 Preparing for the HIPAA Security Rules The final HIPAA Security Rules were published on February 20, 2003 and in many respects

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ), is between Birch Family Services, Inc., a New York not-for-profit corporation ( Covered Entity ) and ( Business Associate

More information

HIPAA Business Associate Agreement Passport to Languages

HIPAA Business Associate Agreement Passport to Languages HIPAA Business Associate Agreement Passport to Languages This Agreement, dated as of, ( Agreement ), is entered into by and between Passport to Languages ( Business Associate ) and. ( Covered Entity ).

More information

Texas Tech University Health Sciences Center HIPAA Privacy Policies

Texas Tech University Health Sciences Center HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 Reviewed Date: August 7, 2017 References: http://www.hhs.gov/ocr/hippa HSC HIPAA website http://www.ttuhsc.edu/hipaa/policies_procedures.aspx

More information

HIPAA COMPLIANCE PLAN FOR OHIO EYE ASSOCIATES, INC.

HIPAA COMPLIANCE PLAN FOR OHIO EYE ASSOCIATES, INC. HIPAA COMPLIANCE PLAN FOR OHIO EYE ASSOCIATES, INC. Adopted August 2016 PREPARED BY STACEY A. BOROWICZ, ESQ. DINSMORE & SHOHL LLP 614-227-4212 STACEY.BOROWICZ@DINSMORE.COM 10600677V1 75602.1 i OHIO EYE

More information

HIPAA ADDENDUM TO SERVICE AGREEMENT

HIPAA ADDENDUM TO SERVICE AGREEMENT HIPAA ADDENDUM TO SERVICE AGREEMENT Business Associate Trading Partner and Chain of Trust THIS AGREEMENT made this 29th day of May, 2015, between, hereafter referred to as Covered Entity, and Commercial

More information

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule 1 IMPORTANCE OF STAFF TRAINING HIPAA staff training is a key, required element in a covered entity's HIPAA

More information

HIPAA Basic Training for Health & Welfare Plan Administrators

HIPAA Basic Training for Health & Welfare Plan Administrators 2010 Human Resources Seminar HIPAA Basic Training for Health & Welfare Plan Administrators Norbert F. Kugele What We re going to Cover Important basic concepts Who needs to worry about HIPAA? Complying

More information

The Privacy Rule. Health insurance Portability & Accountability Act

The Privacy Rule. Health insurance Portability & Accountability Act The Privacy Rule Health insurance Portability & Accountability Act Enacted on August 21, 1996 to amend the Internal Revenue Code of 1986 To improve portability and continuity of health insurance coverage

More information

HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA The Health Insurance Portability and Accountability Act of 1996 Results Physiotherapy s policy regarding privacy and security of protected health information (PHI) is a reflection of our commitment

More information

Central Florida Regional Transportation Authority Table of Contents A. Introduction...1 B. Plan s General Policies...4

Central Florida Regional Transportation Authority Table of Contents A. Introduction...1 B. Plan s General Policies...4 Table of Contents A. Introduction...1 1. Purpose...1 2. No Third Party Rights...1 3. Right to Amend without Notice...1 4. Definitions...1 B. Plan s General Policies...4 1. Plan s General Responsibilities...4

More information

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT BUSINESS ASSOCIATE TERMS AND CONDITIONS

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT BUSINESS ASSOCIATE TERMS AND CONDITIONS COVERYS RRG, INC. HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT BUSINESS ASSOCIATE TERMS AND CONDITIONS WHEREAS, the Administrative Simplification section of the Health Insurance Portability and

More information

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Revised December 6, 2017 Table of Contents Statement of Policy 3 Reason for Policy 3 HIPAA Liaison 3 Individuals and Entities Affected

More information

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF

CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF CROOK COUNTY POLICY AND PROCEDURES FOR COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 Update 2-17-2016 CROOK COUNTY RECORD OF CHANGES 2 TABLE OF CONTENTS Introduction HIPAA

More information

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted as part of the American Recovery and Reinvestment

More information

UCLA Health System Data Use Agreement

UCLA Health System Data Use Agreement UCLA Health System Data Use Agreement The federal Health Insurance Portability and Accountability Act and the regulations promulgated thereunder (collectively referred to as the Privacy Rule ) permit the

More information

OMNIBUS COMPLIANT BUSINESS ASSOCIATE AGREEMENT RECITALS

OMNIBUS COMPLIANT BUSINESS ASSOCIATE AGREEMENT RECITALS OMNIBUS COMPLIANT BUSINESS ASSOCIATE AGREEMENT Effective Date: September 23, 2013 RECITALS WHEREAS a relationship exists between the Covered Entity and the Business Associate that performs certain functions

More information

Interpreters Associates Inc. Division of Intérpretes Brasil

Interpreters Associates Inc. Division of Intérpretes Brasil Interpreters Associates Inc. Division of Intérpretes Brasil Adherence to HIPAA Agreement Exhibit B INDEPENDENT CONTRACTOR PRIVACY AND SECURITY PROTECTIONS RECITALS The purpose of this Agreement is to enable

More information

MNsure Certified Application Counselor Services Agreement with Tribal Nation Attachment A State of Minnesota

MNsure Certified Application Counselor Services Agreement with Tribal Nation Attachment A State of Minnesota MNsure Certified Application Counselor Services Agreement with Tribal Nation Attachment A State of Minnesota 1. MNsure Duties A. Application Counselor Duties (a) (b) (c) (d) (e) (f) Develop and administer

More information

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 References: http://www.hhs.gov/ocr/hipaa TTUHSC El Paso HIPAA website: http://elpaso.ttuhsc.edu/hipaa/ Policy Statement

More information

HIPAA Privacy, Breach, & Security Rules

HIPAA Privacy, Breach, & Security Rules HIPAA Privacy, Breach, & Security Rules An Eagle Associates Presentation Eagle Associates, Inc. www.eagleassociates.net info@eagleassociates.net P.O. Box 1356 Ann Arbor, MI 48106 800-777-2337 Eagle Associates,

More information

PATTERSON MEDICAL SUPPLY, INC. HIPAA BUSINESS ASSOCIATE AGREEMENT WITH CUSTOMERS

PATTERSON MEDICAL SUPPLY, INC. HIPAA BUSINESS ASSOCIATE AGREEMENT WITH CUSTOMERS PATTERSON MEDICAL SUPPLY, INC. HIPAA BUSINESS ASSOCIATE AGREEMENT WITH CUSTOMERS This HIPAA Business Associate Agreement ( BA Agreement ), effective as of the last date written on the signature page attached

More information

NETWORK PARTICIPATION AGREEMENT

NETWORK PARTICIPATION AGREEMENT NETWORK PARTICIPATION AGREEMENT THIS NETWORK PARTICIPATION AGREEMENT ( Agreement ) is entered into on the date(s) indicated below, by and between the undersigned physician (hereinafter Physician ; and

More information

BUSINESS ASSOCIATE AGREEMENT (for use when there is no written agreement with the business associate)

BUSINESS ASSOCIATE AGREEMENT (for use when there is no written agreement with the business associate) BUSINESS ASSOCIATE AGREEMENT (for use when there is no written agreement with the business associate) This HIPAA Business Associate Agreement ( Agreement ) is entered into this day of, 20, by and between

More information

ACGME BUSINESS ASSOCIATE AGREEMENT

ACGME BUSINESS ASSOCIATE AGREEMENT ACGME Business Associate Agreement Template Clinical Site 8/1/2014 Institution Number (Insert name of sponsoring institution, co-sponsor, participating institution or clinical site and institution number

More information

LIMITED DATA SET REQUEST AND DATA USE AGREEMENT

LIMITED DATA SET REQUEST AND DATA USE AGREEMENT LIMITED DATA SET REQUEST AND DATA USE AGREEMENT For Facility Use Only: Date Request Received: / / Instructions: Carefully review and complete this Request for a Limited Data Set of PHI and Data Use Agreement.

More information

HIPAA Business Associate Agreement

HIPAA Business Associate Agreement HIPAA Business Associate Agreement ICANotes LLC doing business at 1600 St Margarets Rd, Annapolis MD 21409 and, doing business at are parties to a Business Associate arrangement as defined under the Health

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (this Agreement ) is made effective as of the of, (the Effective Date ), by and between day hereafter referred to as ( Business Associate

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Agreement is by and between The Health Plan ( Plan ) and Priority Health Managed Benefits, Inc., a Michigan Third Party Administrator ( Business Associate

More information

SUBCONTRACTOR BUSINESS ASSOCIATE ADDENDUM

SUBCONTRACTOR BUSINESS ASSOCIATE ADDENDUM SUBCONTRACTOR BUSINESS ASSOCIATE ADDENDUM This Subcontractor Business Associate Addendum (the Addendum ) is entered into this day of, 20, by and between the University of Maine System, acting through the

More information

Microsoft Online Subscription Agreement/Open Program License Agreement Amendment for HIPAA and HITECH Act Amendment ID MOS13

Microsoft Online Subscription Agreement/Open Program License Agreement Amendment for HIPAA and HITECH Act Amendment ID MOS13 Microsoft Online Subscription Agreement/Open Program License Agreement Amendment for HIPAA and HITECH Act Amendment ID To be valid, Customer must have accepted this Amendment as set forth in the Microsoft

More information

Compliance Steps for the Final HIPAA Rule

Compliance Steps for the Final HIPAA Rule Brought to you by The Alpha Group for the Final HIPAA Rule On Jan. 25, 2013, the Department of Health and Human Services (HHS) issued a final rule under HIPAA s administrative simplification provisions.

More information

Partners Health Plan, NY Provider Electronic Transaction Enrollment Packet

Partners Health Plan, NY Provider Electronic Transaction Enrollment Packet Partners Health Plan, NY Provider Electronic Transaction Enrollment Packet Dear Provider, Partners Health Plan providers are now able to submit standard 837P and 837I electronic claim transactions directly

More information

HIPAA TRANSACTION 837 INSTITUTIONAL STANDARD COMPANION GUIDE

HIPAA TRANSACTION 837 INSTITUTIONAL STANDARD COMPANION GUIDE HIPAA TRANSACTION 837 INSTITUTIONAL STANDARD COMPANION GUIDE Refers to the Implementation Guides Based on X12 version 004010 A1 and version 005010 Companion Guide Version Number: 1.2 October 2, 2010 TABLE

More information

* Corporation General Partnership Limited Partnership LLC Sole Proprietorship Non Profit Other Accounts Payable: Name

* Corporation General Partnership Limited Partnership LLC Sole Proprietorship Non Profit Other Accounts Payable: Name INVACARE CORPORATION New Customer Change of Ownership Customer Credit Application *Legal Name of Business Trade Name (DBA) *Billing Address: Shipping Address (if different): *Federal Tax ID # * # of Years

More information

Terms used, but not otherwise defined, in this Addendum shall have the same meaning as those terms in 45 CFR and

Terms used, but not otherwise defined, in this Addendum shall have the same meaning as those terms in 45 CFR and This Business Associate Addendum, effective April 1, 2003, is entered into by and between Guilford County and/or Guilford County Department of Social Services and/or Guilford County Department of Public

More information

The Security Risk Analysis Requirement for MIPS. August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist

The Security Risk Analysis Requirement for MIPS. August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist The Security Risk Analysis Requirement for MIPS August 8, 2017, 2:00 p.m. to 3:00 p.m. ET Peter Mercuri, Practice Transformation Specialist Today s Speaker Peter Mercuri Peter Mercuri, MBA, HCISPP, CHSA,CMQP,CEHR,CHTS,CHWP

More information

THIRD-PARTY MANAGEMENT OF INFORMATION RESOURCES

THIRD-PARTY MANAGEMENT OF INFORMATION RESOURCES THIRD-PARTY MANAGEMENT OF INFORMATION RESOURCES Policy All vendors and third-party information technology service providers must comply with all applicable UT Health San Antonio policies. A. Contracts

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS This HIPAA Business Associate Agreement ( BAA ) is entered into on this day of, 20 ( Effective Date ), by and between Allscripts

More information

HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE

HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE Policy Preamble This privacy policy ( Policy ) is designed to

More information

ARTICLE 1. Terms { ;1}

ARTICLE 1. Terms { ;1} The parties agree that the following terms and conditions apply to the performance of their obligations under the Service Contract into which this Exhibit is being incorporated. Contractor is providing

More information

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013

8/14/2013. HIPAA Privacy & Security 2013 Omnibus Final Rule update. Highlights from Final Rules January 25, 2013 HIPAA Privacy & Security 2013 Omnibus Final Rule update Dan Taylor, Infinisource Copyright 2013 All rights reserved. Highlights from Final Rules January 25, 2013 Made business associates directly liable

More information

HIPAA and Lawyers: Your stakes have just been raised

HIPAA and Lawyers: Your stakes have just been raised HIPAA and Lawyers: Your stakes have just been raised October 16, 2013 Presented by: Harry Nelson e: hnelson@fentonnelson.com Claire Marblestone e: cmarblestone@fentonnelson.com AGENDA Statutory & Regulatory

More information

HIPAA Electronic Transactions & Code Sets

HIPAA Electronic Transactions & Code Sets P R O V II D E R H II P A A C H E C K L II S T Moving Toward Compliance The Administrative Simplification Requirements of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) will have

More information

HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier. March 22, 2018

HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier. March 22, 2018 1 HIPAA vs. GDPR vs. NYDFS - the New Compliance Frontier March 22, 2018 2 Today s Panel: Kimberly Holmes - Moderator - Vice President, Health Care, Cyber Liability & Emerging Risks, TDC Specialty Underwriters,

More information

March 29, 2018 Key Principles in HIPAA Compliance

March 29, 2018 Key Principles in HIPAA Compliance March 29, 2018 Key Principles in HIPAA Compliance Presented by Benefit Comply Welcome! We will begin at 3 p.m. Eastern There will be no sound until we begin the webinar. When we begin, you can listen to

More information

"HIPAA RULES AND COMPLIANCE"

HIPAA RULES AND COMPLIANCE PRESENTER'S GUIDE "HIPAA RULES AND COMPLIANCE" Training for HIPAA REGULATIONS Quality Safety and Health Products, for Today...and Tomorrow OUTLINE OF MAJOR PROGRAM POINTS OUTLINE OF MAJOR PROGRAM POINTS

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Agreement, dated as of, 2018 ("Agreement"), by and between, on its own behalf and on behalf of all entities controlling, under common control with or controlled

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (this Agreement ) is by and between You, the Covered Entity ( Covered Entity ), and Paubox, Inc. ( Business Associate ). This BAA is effective

More information

INFORMATION AND CYBER SECURITY POLICY V1.1

INFORMATION AND CYBER SECURITY POLICY V1.1 Future Generali 1 INFORMATION AND CYBER SECURITY V1.1 Future Generali 2 Revision History Revision / Version No. 1.0 1.1 Rollout Date Location of change 14-07- 2017 Mumbai 25.04.20 18 Thane Changed by Original

More information

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry HIPAA FUNDAMENTALS For Substance abuse Treatment Industry (c)firststepcounselingonline2014 1 At the conclusion of the course/unit/study the student will... ANALYZE THE EFFECTS OF TRANSFERING INFORMATION

More information

Business Associate Agreement

Business Associate Agreement This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement

More information

RECITALS. In consideration of the mutual promises below and the exchange of information pursuant to this BAA, the Parties agree as follows:

RECITALS. In consideration of the mutual promises below and the exchange of information pursuant to this BAA, the Parties agree as follows: This Business Associate Agreement ( BAA ) is entered into by and between NORCAL Mutual Insurance Company ( NORCAL ) and Insured/Applicant ( Covered Entity ) and is effective as of September 23 rd, 2013

More information

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD HIPAA Redux 2013 Presented by: Kim Cavitt, AuD Moderated by: Carolyn Smaka, Au.D., Editor-in-Chief, AudiologyOnline Expert e-seminar TECHNICAL SUPPORT Need technical support during event? Please contact

More information

HIPAA and Employer Group Health Plans: Nothing is Simple

HIPAA and Employer Group Health Plans: Nothing is Simple HIPAA and Employer Group Health Plans: Nothing is Simple Beth L. Rubin March 26, 2003 2003 Dechert LLP HIPAA Applicability Health Plans -- including employer group health plans Health Care Providers --

More information

The American Recovery and Reinvestment Act of 2009: Health Information Privacy and Security Provisions Here We Go Again

The American Recovery and Reinvestment Act of 2009: Health Information Privacy and Security Provisions Here We Go Again ClientAdvisory The American Recovery and Reinvestment Act of 2009: Health Information Privacy and Security Provisions Here We Go Again February 26, 2009 On February 17, 2009, President Obama signed into

More information

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP UNDERSTANDING HIPAA & THE HITECH ACT Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP 1 Objectives of Presentation Learn what HIPAA is Learn the purpose of HIPAA Understand who HIPAA regulates

More information

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel HIPAA Training HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel Agenda HIPAA basics HITECH highlights Questions and discussion HIPAA Basics Legal Basics Health Insurance Portability

More information

COVERED TRANSACTION means a Transaction for which the Secretary has adopted a standard under HIPAA.

COVERED TRANSACTION means a Transaction for which the Secretary has adopted a standard under HIPAA. UNIVERSITY OF MAINE SYSTEM HIPAA POLICY #1 DEFINITIONS Unless otherwise provided herein, capitalized terms shall have the same meaning as set forth in HIPAA, as amended, and its implementing regulations,

More information